Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis

M. Asaka, T. Onabura, T. Inoue, Shigeki Goto

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)

    Abstract

    In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system logs in order to discover an MLSI-which is an certain event which in many cases occurs during an intrusion. If an MLSI is found, then IDA judges whether the MLSI is accompanied by an intrusion. We adopt discriminant analysis to analyze information after IDA detects an MLSI in a remote attack. Discriminant analysis provides a classification function that allows IDA to separate intrusive activities from non-intrusive activities. Using discriminant analysis, we can detect intrusions by analyzing only a part of system calls occurring on a host machine, and we can determine whether an unknown sample is an intrusion. In this paper, we explain in detail how we perform discriminant analysis to detect intrusions, and evaluate the classification function. We also describe how to extract a sample from system logs, which is necessary to implement the discriminant analysis function in IDA.

    Original languageEnglish
    Title of host publicationProceedings - 2002 Symposium on Applications and the Internet, SAINT 2002
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages64-73
    Number of pages10
    ISBN (Print)0769514472, 9780769514475
    DOIs
    Publication statusPublished - 2002
    EventSymposium on Applications and the Internet, SAINT 2002 - Nara City, Japan
    Duration: 2002 Jan 282002 Feb 1

    Other

    OtherSymposium on Applications and the Internet, SAINT 2002
    Country/TerritoryJapan
    CityNara City
    Period02/1/2802/2/1

    Keywords

    • Internet
    • Intrusion detection

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis'. Together they form a unique fingerprint.

    Cite this